CN117592683A - Storage device management method and system, electronic device and storage medium - Google Patents

Storage device management method and system, electronic device and storage medium Download PDF

Info

Publication number
CN117592683A
CN117592683A CN202311443952.6A CN202311443952A CN117592683A CN 117592683 A CN117592683 A CN 117592683A CN 202311443952 A CN202311443952 A CN 202311443952A CN 117592683 A CN117592683 A CN 117592683A
Authority
CN
China
Prior art keywords
storage device
information
personnel
target
person
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311443952.6A
Other languages
Chinese (zh)
Inventor
林皓
陈家富
范波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing VRV Software Corp Ltd
Original Assignee
Beijing VRV Software Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing VRV Software Corp Ltd filed Critical Beijing VRV Software Corp Ltd
Priority to CN202311443952.6A priority Critical patent/CN117592683A/en
Publication of CN117592683A publication Critical patent/CN117592683A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0633Workflow analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02WCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO WASTEWATER TREATMENT OR WASTE MANAGEMENT
    • Y02W90/00Enabling technologies or technologies with a potential or indirect contribution to greenhouse gas [GHG] emissions mitigation

Abstract

The embodiment of the disclosure discloses a storage device management method and system, electronic equipment and a storage medium. The method comprises the steps of obtaining first personnel information and first storage device information; acquiring first request data; judging whether the target storage device is available or not based on the first storage device information and the first request data; if yes, a first trial result is obtained according to the first request data; acquiring a first identifier of an entering person to obtain second person information; determining whether the entrance personnel has a first right to the target place based on the first personnel information, the second personnel information and the first trial result; if yes, identifying a first identification of the entering person to obtain third person information; based on the first personnel information, the third personnel information, and the first trial result, it is determined whether the entry personnel has a second right to the target storage device. The method can be used for normative, efficient and unattended automatic management of the storage equipment, reduces manual intervention, and improves management efficiency and precision.

Description

Storage device management method and system, electronic device and storage medium
Technical Field
The disclosure relates to the technical field of device management, and in particular relates to a storage device management method and system, electronic equipment and a storage medium.
Background
With the advent of the information age, storage devices are becoming more and more popular, and accordingly, management of storage devices is also becoming a serious problem, especially for enterprises, if storage of storage devices is problematic, risks of information leakage may occur, and significant losses are brought to the enterprises. The traditional method also highly depends on a manual management mode, for example, for the management of people entering and exiting the place where the storage device is located, mostly depends on burglary-resisting doors and register tables, and mostly depends on the judgment of people at the residence place for whether people are allowed to bring the storage device out of or bring the storage device back to the place, so that the traditional method has high subjectivity, and is lack of effective means for system management of the storage device at present.
Disclosure of Invention
In view of the above, embodiments of the present disclosure provide a storage device management method and system, an electronic device, and a storage medium, which can perform standard, efficient and unattended automatic management on a storage device, reduce manual intervention, and improve management efficiency and precision.
In a first aspect, an embodiment of the present disclosure provides a storage device management method, which adopts the following technical scheme:
acquiring first personnel information and first storage device information;
receiving a target storage device claim request instruction, and acquiring first request data;
judging whether a target storage device is available or not based on the first storage device information and the first request data;
if yes, a first trial result is obtained according to the first request data;
if not, judging that the first trial result is not passed;
acquiring a first identifier of an entrance person of a target place where the target storage equipment is located, and acquiring second person information;
determining whether the entrance person has a first right to the target place based on the first personnel information, the second personnel information and the first trial result;
if yes, identifying a first identifier of the entering person to obtain third person information;
based on the first personnel information, the third personnel information, and the first trial result, it is determined whether the entry personnel has a second right to the target storage device.
Optionally, the first personnel information includes any one or more of IC card number, name, job position, telephone, face data, fingerprint data;
The first storage device information comprises any one or more of electronic tag id, type, model, first personnel information of responsible person, asset code, storage address, service life threshold, periodic operation and maintenance time, use times threshold, operation and maintenance times threshold and state.
Optionally, the first request data includes second storage device information, first applicant information and pickup reason information; wherein the second storage device information includes at least one or more of an electronic tag id, type, model number, and asset code of the target storage device; the first applicant information comprises at least one or more of an IC card number, a name, a position and a telephone of a person claiming target storage equipment;
the status includes not on shelf, not on shelf to be picked, not applied for picking and auditing pass, not picked and returned, not applied for returning and returned, returned and not cleaned, returned and cleaned, off shelf and scrapped;
the determining whether the target storage device is available based on the first storage device information and the first request data includes:
Matching the second storage device information with the first storage device information;
if the matching is successful, judging whether the target storage device belongs to an unavailable condition or not based on the first storage device information;
wherein the unavailable condition comprises: the service life of the target storage device reaches a service life threshold, the target storage device is in regular operation and maintenance time, the service frequency of the target storage device reaches a service frequency threshold, the operation and maintenance frequency of the target storage device reaches an operation and maintenance frequency threshold, and the state of the target storage device is not on shelf, is applied for getting and checking to pass, is taken for not returning, is applied for returning but not returning, is returned but not cleaned, is taken off shelf or is scrapped.
Optionally, the target storage device is stored in a cabinet grid of the intelligent cabinet;
after determining that the entry person has a second right to the target storage device,
and opening a cabinet door of the cabinet where the target storage device is based on the first request data and the first storage device information.
Optionally, the method further comprises:
identifying a first identifier of a person who goes out of the target place to obtain fourth personnel information, and identifying a second identifier of the target storage device to obtain third storage device information;
Determining whether the panelist has third rights to the target location based on the first personnel information, the fourth personnel information, the first request data, the third storage device information, and the first review result;
the fourth personnel information comprises any one or more of an IC card number, a name, a position, a telephone, face data and fingerprint data; the third storage device information includes at least one or more of an electronic tag id, a type, a model number, and an asset code.
In a second aspect, an embodiment of the present disclosure further provides a storage device management system, which adopts the following technical scheme:
the first acquisition module is used for acquiring first personnel information and first storage equipment information;
the first acquisition module is used for receiving a target storage device claim request instruction and acquiring first request data;
a first judging module, configured to judge whether a target storage device is available based on the first storage device information and the first request data; if yes, executing a first obtaining module; if not, executing a first judging module;
the first obtaining module is used for obtaining a first trial result according to the first request data;
The result judging module is used for judging that the first trial result is not passed;
the second acquisition module is used for acquiring a first identifier of an entrance person of a target place where the target storage device is located to obtain second person information;
the second judging module is used for determining whether the entrance personnel has a first authority to the target place or not based on the first personnel information, the second personnel information and the first trial result; if yes, executing a first identification module;
the first identification module is used for identifying the first identification of the entrance personnel and obtaining third personnel information;
and the third judging module is used for determining whether the entering person has a second right to the target storage device or not based on the first personnel information, the third personnel information and the first trial result.
In a third aspect, an embodiment of the present disclosure further provides a storage device management method, which adopts the following technical scheme:
acquiring first personnel information and first storage device information;
receiving a return request instruction of the target storage device, and acquiring second request data;
obtaining a second trial result according to the second request data;
acquiring a first identifier of an entrance person of a target place where a target storage device is located, obtaining fifth personnel information, and acquiring a second identifier of the target storage device, obtaining fifth storage device information;
Determining whether the entrance person has a fourth right to the target place based on the first person information, the fifth person information, the second request data, the fifth storage device information, and the second trial result;
if yes, identifying a first identifier of the entering person to obtain sixth person information, and identifying a second identifier of the target storage device to obtain sixth storage device information;
determining whether the entry person has a fifth right to the target storage device based on the first person information, the sixth person information, the second request data, the sixth storage device information, and the second trial result.
In a fourth aspect, an embodiment of the present disclosure further provides a storage device management system, which adopts the following technical scheme:
the second acquisition module is used for acquiring the first personnel information and the first storage equipment information;
the third acquisition module is used for receiving a return request instruction of the target storage device and acquiring second request data;
the second obtaining module is used for obtaining a second trial result according to the second request data;
the fourth acquisition module is used for acquiring a first identifier of an entrance person of a target place where the target storage device is located, obtaining fifth personnel information, and acquiring a second identifier of the target storage device, obtaining fifth storage device information;
A fourth judging module, configured to determine, based on the first personnel information, the fifth personnel information, the second request data, the fifth storage device information, and the second trial result, whether the entrance personnel has a fourth right for the target location; if yes, executing a second identification module;
the second identification module is used for identifying the first identification of the entering person to obtain sixth person information, and identifying the second identification of the target storage device to obtain sixth storage device information;
and a fifth judging module, configured to determine, based on the first personnel information, the sixth personnel information, the second request data, the sixth storage device information, and the second trial result, whether the entrance personnel has a fifth right for the target storage device.
In a fifth aspect, an embodiment of the present disclosure further provides an electronic device, which adopts the following technical scheme:
the electronic device includes:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform any one of the storage device management methods described above.
In a sixth aspect, the presently disclosed embodiments also provide a computer-readable storage medium storing computer instructions for causing a computer to perform any of the above storage device management methods.
The storage device management method provided by the embodiment of the disclosure prepares for a follow-up target storage device claim process by collecting and storing the first personnel information and the first storage device information. In the process of claiming the target storage device, whether the target storage device is available or not is judged based on the first storage device information and the first request data, and under the condition that the target storage device is unavailable, the first examination result is directly judged to be failed, otherwise, the first examination result is obtained based on the acquired first request data, and the twice identification of the entrance personnel is realized based on the first examination result, so that the dual identity verification is realized, the certainty of the identity of the entrance personnel is improved, only the entrance personnel meeting the conditions can enter a place and get the target storage device, the examination flow of storage device management is enhanced, the potential security vulnerabilities and illegal behaviors are reduced, and the security is improved. And the first identification method for automatically identifying the entering personnel replaces manual identification, so that the dependence on manual labor can be reduced, automatic management is realized, the management efficiency and the management precision are improved, and the unattended storage equipment management method is realized.
Drawings
Fig. 1 is a flow chart of a storage device management method according to an embodiment of the present disclosure;
FIG. 2 is a schematic diagram of a complementary flow of a storage device management method according to an embodiment of the disclosure;
FIG. 3 is a schematic flow chart of the substeps of S15 according to the embodiment of the disclosure;
FIG. 4 is a functional block diagram of a storage device management system provided by an embodiment of the present disclosure;
FIG. 5 is a flowchart illustrating another method for managing storage devices according to an embodiment of the present disclosure;
FIG. 6 is a schematic flow chart of the substeps of S21 according to the embodiment of the disclosure;
FIG. 7 is a schematic flow chart of the substeps of S24 provided in the embodiment of the disclosure;
FIG. 8 is a schematic diagram of a complementary flow chart of a storage device management method according to an embodiment of the disclosure;
FIG. 9 is a functional block diagram of a storage device management system provided by an embodiment of the present disclosure;
fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the disclosure.
Detailed Description
Embodiments of the present disclosure are described in detail below with reference to the accompanying drawings.
Referring to fig. 1, the present disclosure provides a storage device management method, including the steps of:
s1: first person information and first storage device information are acquired.
The step of acquiring the first personnel information specifically comprises the following steps:
and aiming at different places, a passing personnel list is formulated on a management platform, all or part of personnel passing rights in different units or different departments are granted, and the same personnel can be granted with the passing rights of different places. The information of the personnel granted the passing authority is collected, wherein the information comprises any one or more of an IC card number, a name, a position, a telephone, face data and fingerprint data, the collected information is recorded as first personnel information, and the first personnel information is stored in a passing personnel list. If personnel change exists in the units or departments, the passing personnel list is updated in time.
The obtaining the first storage device information specifically includes:
and making a storage device list on a management platform aiming at the storage devices in different places. The method comprises the steps of collecting information of storage equipment, including any one or more of electronic tag id (RFID electronic tag is adopted in the present disclosure), type, model, first personnel information of responsible persons, asset codes, storage addresses, service life threshold, periodic operation and maintenance time, use times threshold, operation and maintenance times threshold and state, recording the collected information as first storage equipment information, and storing the first storage equipment information into a storage equipment list.
The state of the storage device comprises the state that the storage device is not put on shelf, is to be taken off and checked through, is to be taken off and not returned, is to be returned and not returned, is returned and not cleaned, is returned and cleaned, is taken off and is scrapped. Types of storage devices include U disk, removable hard disk, optical disk, and magnetic tape.
A plurality of intelligent cabinets are arranged in the place, storage equipment is stored in cabinet grids of the intelligent cabinets, and storage addresses comprise numbers of the intelligent cabinets and numbers of the cabinet grids. If new storage equipment is needed, relevant information is input into the management platform, and the intelligent cabinet is put on shelf, put off shelf or scrapped, and the like, the storage equipment list is updated in time.
Further, if the storage device is in the regular operation and maintenance time, the service life of the storage device reaches the service life threshold, the use times reaches the use times threshold or the operation and maintenance times reaches the operation and maintenance times threshold, a prompt to be operated and maintained is sent to terminal equipment held by operation and maintenance personnel.
S2: and receiving a target storage device claim request instruction, and acquiring first request data.
Personnel desiring to claim a storage device typically include confidential personnel having storage device usage requirements and operation and maintenance personnel desiring to remove the storage device from shelf, wherein the operation and maintenance personnel can perform maintenance or other operations on the storage device after removing the storage device from shelf.
In the process of claiming the target storage device, claiming personnel acquire a first trial form by using terminal equipment, office assistants or nails in the terminal equipment and other software, fill relevant application data in the first trial form, generate first request data, send a claiming request instruction of the target storage device and the first request data to a management platform by clicking a 'confirmation' key and the like, and also send the claiming request instruction of the target storage device and the first request data to the management platform by using relevant equipment in a device room. The first request data comprises second storage device information, first applicant information and pickup reason information, the second storage device information comprises at least one or more of electronic tag id, type, model and asset code of the target storage device, and the first applicant information comprises at least one or more of IC card number, name, position and telephone of claimant. In the process of sending the first request data, the claimant can also generate a signature by handwriting the name through a touch screen of the terminal equipment or related equipment in the equipment room, so as to play a role in verifying the identity of the claimant.
S3: judging whether the target storage device is available or not based on the first storage device information and the first request data; if yes, executing S4; if not, S5 is executed.
Specifically, the management platform receives a target storage device claim request instruction, and matches the second storage device information with the first storage device information; if the matching fails, executing S5; if the matching is successful, judging whether the target storage device belongs to the unavailable condition based on the first storage device information; if not, the management platform forwards the first request data to the corresponding auditing terminal according to the first request data; if yes, executing S5, and feeding back the first trial result to the equipment for sending the first request data as a non-passing reason.
The situation that the target storage device is not available includes: the service life of the target storage device reaches a service life threshold, the target storage device is in regular operation and maintenance time, the use times of the target storage device reach a use times threshold, the operation and maintenance times of the target storage device reach an operation and maintenance times threshold, and the state of the target storage device is not on shelf, is applied for picking up and checking to pass, is taken up and not returned, is applied for returning but not returned, is returned but not cleaned, is taken off shelf or is scrapped.
The storage device is special, and can be put into use again after the storage space is cleaned by operation and maintenance personnel after each use, so that information in the storage device is prevented from being leaked, and the information safety is improved. Therefore, if the state of the storage device is returned but not cleaned, a prompt for cleaning is sent to the terminal device held by the operation and maintenance personnel.
The management platform forwards the first request data to a corresponding auditing terminal according to the first request data, and specifically comprises the following steps: the auditing personnel are responsible for auditing the first request data through the auditing terminals, and generally, a plurality of auditing personnel exist, and correspondingly, the auditing terminals also have the same quantity as the auditing personnel, so that the first request data can be classified and forwarded to different auditing terminals according to the difference of target storage devices, the difference of claimants or the difference of the acquired reason information.
S4: and obtaining a first trial result according to the first request data.
The auditing personnel logs in the auditing terminal in a login mode which comprises the steps of utilizing a camera on the auditing terminal to conduct face recognition, utilizing a fingerprint instrument on the auditing terminal to conduct fingerprint recognition or utilizing an IC card recognizer on the auditing terminal to conduct IC card recognition and other modes to verify information of the auditing personnel, and after verification is passed, successfully logging in the auditing terminal.
And the auditing personnel utilize the auditing terminal to check the second storage equipment information, the first applicant information and the acquisition reason information, audit the second storage equipment information, the first applicant information and the acquisition reason information, give an approval result based on the auditing condition, record the approval result obtained at the moment as a first approval result, and send the first approval result to the management platform and the equipment for sending the first request data. If the first trial result is not passed, feeding back the reason that the first trial result is not passed to the equipment for sending the first request data.
Optionally, in the approval process, multiple auditors may perform a step-by-step approval, and the finally given approval result is recorded as the first approval result.
S5: and judging that the first trial result is not passed.
S6: and acquiring a first identifier of an entrance person of a target place where the target storage device is located, and acquiring second person information.
The gate is arranged at the entrance of the place, the gate at the entrance of the place identifies the first identification of the entering personnel through the modes of face recognition, fingerprint identification or IC card identification, and the first identification is sent to the management platform. If the face recognition mode is adopted, the first identifier is face data, if the fingerprint recognition mode is adopted, the first identifier is fingerprint data, and if the IC card recognition mode is adopted, the first identifier is an IC card number. The management platform obtains corresponding personnel information based on the first identification and records the corresponding personnel information as second personnel information, wherein the second personnel information comprises any one or more of an IC card number, a name, a position, a telephone, face data and fingerprint data.
For the IC card identification mode, the entrance personnel can carry the IC card or the employee card to walk normally, and the IC card identifier can identify the IC card or the employee card within the effective distance to obtain the IC card number.
S7: determining whether the entrance personnel has a first right to the target place based on the first personnel information, the second personnel information and the first trial result; if yes, executing S8; if not, S9 is executed.
The management platform matches the second personnel information with the first personnel information in the passing personnel list; if the matching fails, indicating that the entrance personnel do not have the passing authority, determining that the entrance personnel do not have the first authority, and executing S9; if the matching is successful, indicating that the entrance personnel have passing rights, and inquiring whether the first trial result passes or not; if yes; determining that the entrance personnel has the first authority, and executing S8; if not, determining that the entrance personnel does not have the first authority, and executing S9.
S8: and opening the gate at the entrance of the place, and closing the gate at the entrance of the place after the entrance personnel pass.
The management platform sends a first instruction to the gate at the entrance of the place, the gate at the entrance of the place is opened after the gate at the entrance of the place receives the first instruction, and the gate at the entrance of the place is closed after the entrance personnel pass through.
S9: the site entrance gate is not opened.
S9, specifically, the management platform does not send a first instruction to the gate at the place entrance, and the gate at the place entrance is not opened on the premise that the gate at the place entrance does not receive the first instruction.
Further, the gate at the entrance of the place is not opened, and the alarm prompt is carried out.
S10: and identifying the first identification of the entering person to obtain third person information.
The intelligent cabinet recognizes the first identification of the entering person through the modes of face recognition, fingerprint recognition or IC card recognition and the like, and the intelligent cabinet sends the first identification to the management platform. The management platform obtains corresponding personnel information based on the first identification and records the personnel information as third personnel information, wherein the third personnel information comprises any one or more of an IC card number, a name, a position, a telephone, face data and fingerprint data.
S11: determining whether the entering person has second authority to the target storage device based on the first personnel information, the third personnel information and the first trial result; if yes, executing S12; if not, S13 is performed.
Specifically, the management platform matches the third personnel information with the first personnel information in the passing personnel list; if the matching fails, the entering personnel do not have the passing authority, the entering personnel are determined to have no second authority, and S13 is executed; if the matching is successful, indicating that the entrance personnel have passing rights, and inquiring whether the first trial result passes or not; if yes, determining that the entrance personnel has the second authority, and executing S12; if not, determining that the entrance personnel does not have the second authority, and executing S13.
S12: and opening a cabinet door of the cabinet where the target storage device is based on the first request data and the first storage device information, and closing the cabinet door after the target storage device is picked up.
The management platform inquires first storage device information containing second storage device information in the storage device list, marks the first storage device information as seventh storage device information, and sends a storage address in the seventh storage device information to the intelligent cabinet. The intelligent cabinet opens the cabinet door of the cabinet grid of the target storage device based on the storage address, the entrance personnel closes the cabinet door after taking out the target storage device or the intelligent cabinet automatically closes the cabinet door after sensing that the target storage device leaves the cabinet grid, and the state of the cabinet grid becomes idle.
S13: the cabinet door is not opened.
S13 specifically indicates that the management platform does not send a storage address to the intelligent cabinet, and the intelligent cabinet does not open the cabinet door on the premise that the intelligent cabinet does not receive the storage address.
Further, the cabinet door is not opened, and meanwhile, alarm prompt is carried out.
Further, referring to fig. 2, the storage device management method further includes the steps of:
s14: and identifying the first identifier of the field personnel to obtain fourth personnel information, and identifying the second identifier of the target storage device to obtain third storage device information.
The entry person gets to the target storage device and leaves the location, at which time it is referred to as the exit person. The gate is arranged at the place exit, the gate at the place exit identifies the first identification of the place personnel through the modes of face recognition, fingerprint recognition or IC card recognition and the like, and the first identification is sent to the management platform. The management platform obtains corresponding personnel information based on the first identification and records the personnel information as fourth personnel information, wherein the fourth personnel information comprises any one or more of an IC card number, a name, a position, a telephone, face data and fingerprint data.
The gate at the exit of the place is provided with an RFID card identifier, the RFID card identifier identifies an RFID electronic tag on a target storage device carried by the person at the exit of the place to obtain a second identifier, and the second identifier is sent to the management platform. The management platform obtains corresponding storage device information based on the second identification and records the storage device information as third storage device information, wherein the third storage device information comprises at least one or more of electronic tag id, type, model and asset code.
For the RFID card identification mode, the panelist can walk normally with the target storage device, and the RFID card identifier can identify the RFID electronic tag on the target storage device within the effective distance to obtain the second identifier.
S15: determining whether the panelist has third rights to the target location based on the first personnel information, the fourth personnel information, the first request data, the third storage device information, and the first trial result; if yes, executing S16; if not, S17 is performed.
Specifically, referring to fig. 3, the management platform performs the following steps:
s151: matching the fourth person information with the first person information in the passing person list; if the matching fails, indicating that the panelist does not have the passing authority, determining that the panelist does not have the third authority, and executing S17; if the matching is successful, it indicates that the panelist has the right to pass, and S152 is executed.
S152: matching the third storage device information with the second storage device information in the first request data; if the matching fails, determining that the panelist does not have the third authority, and executing S17; if the matching is successful, S153 is performed.
S153: inquiring whether the first trial result is passed or not; if yes, determining that the panelist has the third authority, and executing S16; if not, determining that the panelist does not have the third authority, and executing S17.
S16: and opening a gate at the exit of the place, and closing the gate at the exit of the place after the personnel carrying the target storage equipment to pass.
The management platform sends a second instruction to the gate at the exit of the place, the gate at the exit of the place is opened after the gate at the exit of the place receives the second instruction, and the gate at the exit of the place is closed after the exit personnel carry the target storage equipment to pass.
S17: the gate at the exit of the site is not opened.
S17, specifically, the management platform does not send a second instruction to the gate at the exit of the place, and the gate at the exit of the place is not opened on the premise that the gate at the exit of the place does not receive the second instruction.
Further, the gate at the exit of the place is not opened, and the alarm prompt is carried out.
Referring to fig. 4, the present disclosure provides a storage device management system, comprising:
the first acquisition module is used for acquiring first personnel information and first storage equipment information;
the first acquisition module is used for receiving a target storage device claim request instruction and acquiring first request data;
the first judging module is used for judging whether the target storage device is available or not based on the first storage device information and the first request data; if yes, executing a first obtaining module; if not, executing a first judging module;
the first obtaining module is used for obtaining a first trial result according to the first request data;
The result judging module is used for judging that the first trial batch result does not pass;
the second acquisition module is used for acquiring a first identifier of an entrance person of a target place where the target storage equipment is located to obtain second person information;
the second judging module is used for determining whether the entering person has a first authority to the target place or not based on the first personnel information, the second personnel information and the first trial result; if yes, executing a first identification module;
the first identification module is used for identifying a first identification of an entering person and obtaining third person information;
and the third judging module is used for determining whether the entering person has the second authority to the target storage device or not based on the first personnel information, the third personnel information and the first trial result.
The various modifications and specific examples of the storage device management method provided above are equally applicable to the storage device management system provided in the present disclosure, and those skilled in the art will be aware of the implementation method of the storage device management system through the foregoing detailed description of the storage device management method, which is not described in detail herein for brevity of description.
Referring to fig. 5, the present disclosure further provides a storage device management method, including the steps of:
T1: first person information and first storage device information are acquired.
Specific reference is made to S1, and details are not repeated here.
T2: and receiving a return request instruction of the target storage device, and acquiring second request data.
Personnel to return the storage device typically include confidential personnel who have used the storage device and operation and maintenance personnel who have maintained the storage device. And in the returning process of the target storage device, the application returning personnel acquire a second trial batch table by using the terminal device or related equipment in the equipment room, fill related application data in the second trial batch table, generate second request data and send a returning request instruction of the target storage device and the second request data to the management platform by clicking a 'confirm' button and the like. The second request data comprises fourth storage device information, second applicant information and return reason information, the fourth storage device information comprises at least one or more of electronic tag id, type, model and asset code of the target storage device, and the second applicant information comprises at least one or more of IC card number, name, position and telephone of the person applying for return. In the process of sending the second request data, the personnel applying for returning the storage equipment can also generate a signature by handwriting in the name through the touch screen of the related equipment in the terminal equipment or the equipment room, so that the function of verifying the identity of the personnel is achieved.
The management platform receives a return request instruction of the target storage device and forwards the second request data to the corresponding auditing terminals, specifically, the auditing personnel are responsible for auditing the second request data through the auditing terminals, and generally, a plurality of auditing personnel are provided, the corresponding auditing terminals are also provided with the same quantity as the auditing personnel, and the second request data can be forwarded to different auditing terminals in a classified manner according to different target storage devices, different application return personnel or different return reason information.
Further, the management platform performs preliminary approval on the second request data before approval by an auditor. Specifically, the fourth storage device information is matched with the first storage device information; if the matching fails, the second trial result is not passed; and if the matching is successful, forwarding the second request data to the corresponding auditing terminal.
T3: and obtaining a second trial batch result according to the second request data.
And the auditing personnel utilize an auditing terminal to check the fourth storage device information, the second applicant information and the return reason information, audit the fourth storage device information, the second applicant information and the return reason information, give an approval result based on the auditing condition, record the approval result obtained at the moment as a second approval result, and send the second approval result to the management platform and the equipment for sending the second request data. If the second trial batch result is not passed, feeding back the reason that the second trial batch result is not passed to the equipment for sending the second request data.
Optionally, in the approval process, multiple auditors may perform a step-by-step approval, and the finally given approval result is recorded as a second approval result.
T4: and acquiring a first identifier of an entrance person of a target place where the target storage device is located, obtaining fifth personnel information, and acquiring a second identifier of the target storage device, obtaining fifth storage device information.
The gate at the entrance of the place recognizes the first identification of the entrance personnel in a face recognition mode, a fingerprint recognition mode or an IC card recognition mode and sends the first identification to the management platform. The management platform obtains corresponding personnel information based on the first identification and records the personnel information as fifth personnel information, wherein the fifth personnel information comprises any one or more of an IC card number, a name, a position, a telephone, face data and fingerprint data.
The gate at the entrance of the place is also provided with an RFID card identifier, the RFID card identifier identifies an RFID electronic tag on a target storage device carried by an entering person, a second identifier is obtained, and the second identifier is sent to the management platform. The management platform obtains corresponding storage device information based on the second identification and records the corresponding storage device information as fifth storage device information, wherein the fifth storage device information comprises at least one or more of electronic tag id, type, model and asset code.
T5: determining whether the entering person has fourth authority for the target place based on the first personnel information, the fifth personnel information, the second request data, the fifth storage device information and the second trial result; if yes, executing T6; if not, then T7 is performed.
Specifically, referring to fig. 6, the management platform performs the following steps:
t51: matching the fifth personnel information with the first personnel information in the passing personnel list; if the matching fails, indicating that the entrance personnel do not have the passing authority, determining that the entrance personnel do not have the fourth authority, and executing T7; if the matching is successful, the entrance personnel have the passing authority, and the T52 is executed.
T52: matching the fifth storage device information with fourth storage device information in the second request data; if the matching fails, determining that the entering person does not have the fourth authority, and executing T7; if the match is successful, T53 is performed.
T53: inquiring whether the second trial batch result is passed; if yes, determining that the entering person has the fourth authority, and executing T6; if not, determining that the entrance personnel does not have the fourth authority, and executing T7.
T6: and opening the gate at the entrance of the place, and closing the gate at the entrance of the place after the entrance personnel carry the target storage equipment to pass.
The management platform sends a first instruction to the gate at the entrance of the place, the gate at the entrance of the place is opened after the gate at the entrance of the place receives the first instruction, and the gate at the entrance of the place is closed after an entrance person carries the target storage device to pass through.
T7: the site entrance gate is not opened.
T7 specifically means that the management platform does not send the first instruction to the gate at the place entrance, and the gate at the place entrance does not open the gate at the place entrance on the premise that the gate at the place entrance does not receive the first instruction.
Further, the gate at the entrance of the place is not opened, and the alarm prompt is carried out.
T8: and identifying the first identification of the entering person to obtain sixth person information, and identifying the second identification of the target storage device to obtain sixth storage device information.
The intelligent cabinet recognizes the first identification of the entering person through the modes of face recognition, fingerprint recognition or IC card recognition and the like, and the intelligent cabinet sends the first identification to the management platform. The management platform obtains corresponding personnel information based on the first identification and records the personnel information as sixth personnel information, wherein the sixth personnel information comprises any one or more of an IC card number, a name, a position, a telephone, face data and fingerprint data.
The intelligent cabinet is also provided with an RFID card identifier, the RFID card identifier identifies an RFID electronic tag on the target storage device carried by the entering person, a second identifier is obtained, and the second identifier is sent to the management platform. The management platform obtains corresponding storage device information based on the second identification and records the storage device information as sixth storage device information, wherein the sixth storage device information comprises at least one or more of electronic tag id, type, model and asset code.
T9: determining whether the entering person has fifth authority to the target storage device based on the first personnel information, the sixth personnel information, the second request data, the sixth storage device information and the second trial result; if yes, executing T10; if not, then T11 is performed.
Specifically, referring to fig. 7, the management platform performs the following steps:
t91: matching the sixth person information with the first person information in the passing person list; if the matching fails, indicating that the entrance personnel do not have the passing authority, determining that the entrance personnel do not have the fifth authority, and executing the T11; if the matching is successful, the entrance personnel have the passing authority, and T92 is executed.
T92: matching the sixth storage device information with fourth storage device information in the second request data; if the matching fails, determining that the entrance personnel does not have the fifth authority, and executing S13; if the match is successful, then T93 is performed.
T93: inquiring whether the second trial batch result is passed; if yes, determining that the entering person has a fifth authority, and executing T10; if not, determining that the entrance personnel does not have the fifth authority, and executing T11.
T10: inquiring and opening the cabinet door of the idle cabinet grid, and updating the storage device list.
The management platform inquires the numbers of the idle cabinet grids and the intelligent cabinets to which the idle cabinet grids belong, selects one of the idle cabinet grids and the numbers of the intelligent cabinets to which the idle cabinet grids belong as a storage address, and sends the storage address to the intelligent cabinets. The intelligent cabinet opens the cabinet door of corresponding cabinet check based on depositing the address, and the personnel of entering a field closes cabinet door after depositing target storage device or intelligent cabinet is automatic to close cabinet door after perceiving target storage device deposit to cabinet check, and the state of this cabinet check becomes in the use. The storage address of the target storage device may change, and the storage device list is updated in time.
T11: the cabinet door is not opened.
T11 specifically means that the management platform does not send a storage address to the intelligent cabinet, and the intelligent cabinet does not open the cabinet door on the premise that the intelligent cabinet does not receive the storage address.
Further, the cabinet door is not opened, and meanwhile, alarm prompt is carried out.
Further, referring to fig. 8, the storage device management method further includes the steps of:
t12: and identifying the first identification of the field personnel to obtain seventh personnel information.
The entry person leaves the venue after returning to the target storage device, and is now referred to as the exit person. The gate at the exit of the place recognizes the first identification of the personnel in the place through the modes of face recognition, fingerprint recognition or IC card recognition, and the first identification is sent to the management platform. The management platform obtains corresponding personnel information based on the first identification and records the personnel information as seventh personnel information, wherein the seventh personnel information comprises any one or more of an IC card number, a name, a position, a telephone, face data and fingerprint data.
T13: determining whether the panelist has a sixth right to the target location based on the first personnel information, the seventh personnel information, and the second trial result; if yes, executing T14; if not, then T15 is performed.
Specifically, the management platform matches the seventh personnel information with the first personnel information in the passing personnel list; if the matching fails, indicating that the panelist does not have the passing authority, determining that the panelist does not have the sixth authority, and executing T15; if the matching is successful, indicating that the panelist has the passing authority, and inquiring whether the second trial result is passed or not; if yes, determining that the panelist has a sixth authority, and executing T14; if not, determining that the panelist does not have the sixth authority, and executing T15.
T14: and opening a gate at the exit of the place, and closing the gate at the exit of the place after the passing of the personnel.
The management platform sends a second instruction to the gate at the exit of the place, and after receiving the second instruction, the gate at the exit of the place is opened, and after passing by, the exit personnel close the gate at the exit of the place.
T15: the gate at the exit of the site is not opened.
T15 specifically means that the management platform does not send a second instruction to the gate at the exit of the place, and the gate at the exit of the place is not opened on the premise that the gate at the exit of the place does not receive the second instruction.
In the target storage device claim process and the target storage device return process, the management platform automatically generates place entry and exit login information and storage device entry and exit records, and the place entry and exit login information and the storage device entry and exit records can be printed.
Optionally, the gate at the place entrance and the gate at the place exit are not directly interacted with the management platform, the gate at the place entrance and the gate at the place exit are used as peripherals and are connected with interfaces on the main board of the intelligent cabinet through serial ports or other interfaces, so that the gate at the place entrance and the gate at the place exit can be in information interaction with the intelligent cabinet, two-way communication is realized, the first identifier and the second identifier acquired by the gate at the place entrance, the first identifier and the second identifier acquired by the gate at the place exit and the like are transmitted to the intelligent cabinet, and then the intelligent cabinet is forwarded to the management platform; similarly, the management platform firstly transmits the first instruction to the intelligent cabinet, then the intelligent cabinet forwards the gate at the entrance of the place, and the management platform firstly transmits the second instruction to the intelligent cabinet, and then the intelligent cabinet forwards the gate at the exit of the place.
Based on the method, the personnel in the method have the first marks with unified standards, the storage equipment has the second marks with unified standards, and the method for automatically identifying the first marks and the second marks is adopted to replace manual identification, so that the identification efficiency and accuracy are improved. For entering personnel, the two times of identification are carried out, the first time of identification is to prevent personnel without passing permission and approval from entering a place, the second time of identification is to prevent personnel without passing permission and approval from picking up or returning to a target storage device, and by the method of the two times of identification, the storage device and the place management can be effectively combined, and the safety of the storage device is enhanced. The management platform also carries out preliminary approval on the first request data and the second request data, the burden of auditors is reduced, and if the admission personnel or the departure personnel carry the target storage equipment, the target storage equipment is identified, so that the target storage equipment which does not pass the approval is prevented from entering or leaving the place. In summary, the present disclosure provides a canonical, efficient, and unattended storage apparatus and method of managing a location where the storage apparatus is located.
In the above, the auditing terminal, the device for sending the first request data, the device for sending the second request data, the management platform, the intelligent cabinet and other devices with information interaction are regarded as nodes. In the aspect of channel encryption among nodes, an encryption channel https is adopted; in terms of service data, an asymmetric algorithm is adopted for encryption and decryption, every two nodes correspond to a key pair, the key pair comprises a public key and a private key, key information is generated by network card MAC information, and each node reads the network card MAC for encryption and decryption so as to ensure that corresponding information interaction is carried out by an authorized terminal.
The intelligent cabinet comprises a core processing unit, a storage unit, I/O equipment, a data bus and an external resource interface. The core processing unit is a processor of ARM architecture, and is used as an operation and control core and is a final execution unit for information processing and program running; the storage unit comprises Flash memory, SDRAM and other devices for accessing information; I/O devices are input and output devices; the data bus may be a system bus or a peripheral bus, etc.; the external resource interface is a plurality of interfaces integrated or expanded on the main board, such as a serial port, a USB port and the like, and is used for connecting different external devices to receive input information or send information, and the external devices comprise storage device identification sensing devices (e.g. RFID identifiers), personnel identification sensing devices (e.g. intelligent cameras, IC card identifiers and fingerprint meters), human-computer interaction devices (touch screens) and the like.
The touch screen is used as man-machine interaction equipment, can display part of information of the storage equipment for field personnel to check, for example, electronic tag id, type, model, asset code, storage address and the like, and updates the displayed information along with the update of the storage equipment list.
Referring to fig. 9, the present disclosure further provides a storage device management system, including:
the second acquisition module is used for acquiring the first personnel information and the first storage equipment information;
the third acquisition module is used for receiving a return request instruction of the target storage device and acquiring second request data;
the second obtaining module is used for obtaining a second trial batch result according to the second request data;
the fourth acquisition module is used for acquiring a first identifier of an entrance person of a target place where the target storage device is located, obtaining fifth personnel information, and acquiring a second identifier of the target storage device, obtaining fifth storage device information;
the fourth judging module is used for determining whether the entering person has fourth authority to the target place or not based on the first personnel information, the fifth personnel information, the second request data, the fifth storage equipment information and the second trial result; if yes, executing a second identification module;
The second identification module is used for identifying a first identification of an entering person to obtain sixth person information, and identifying a second identification of the target storage device to obtain sixth storage device information;
and a fifth judging module for determining whether the entering person has a fifth right to the target storage device based on the first personnel information, the sixth personnel information, the second request data, the sixth storage device information, and the second trial result.
The various modifications and specific examples of the storage device management method provided above are equally applicable to the storage device management system provided in the present disclosure, and those skilled in the art will be aware of the implementation method of the storage device management system through the foregoing detailed description of the storage device management method, which is not described in detail herein for brevity of description.
An electronic device according to an embodiment of the present disclosure includes a memory and a processor. The memory is for storing non-transitory computer readable instructions. In particular, the memory may include one or more computer program products, which may include various forms of computer-readable storage media, such as volatile memory and/or non-volatile memory. The volatile memory may include, for example, random Access Memory (RAM) and/or cache memory (cache), and the like. The non-volatile memory may include, for example, read Only Memory (ROM), hard disk, flash memory, and the like.
The processor may be a Central Processing Unit (CPU) or other form of processing unit having data processing and/or instruction execution capabilities, and may control other components in the electronic device to perform the desired functions. In one embodiment of the present disclosure, the processor is configured to execute the computer readable instructions stored in the memory, so that the electronic device performs all or part of the steps of the storage device management method of the embodiments of the present disclosure described above.
It should be understood by those skilled in the art that, in order to solve the technical problem of how to obtain a good user experience effect, the present embodiment may also include well-known structures such as a communication bus, an interface, and the like, and these well-known structures are also included in the protection scope of the present disclosure.
Fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the disclosure. A schematic diagram of an electronic device suitable for use in implementing embodiments of the present disclosure is shown. The electronic device shown in fig. 10 is merely an example and should not be construed to limit the functionality and scope of use of the disclosed embodiments.
As shown in fig. 10, the electronic device may include a processor (e.g., a central processing unit, a graphic processor, etc.) that may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) or a program loaded from a storage device into a Random Access Memory (RAM). In the RAM, various programs and data required for the operation of the electronic device are also stored. The processor, ROM and RAM are connected to each other by a bus. An input/output (I/O) interface is also connected to the bus.
In general, the following devices may be connected to the I/O interface: input means including, for example, sensors or visual information gathering devices; output devices including, for example, display screens and the like; storage devices including, for example, magnetic tape, hard disk, etc.; a communication device. The communication means may allow the electronic device to communicate wirelessly or by wire with other devices, such as edge computing devices, to exchange data. While fig. 10 shows an electronic device having various means, it is to be understood that not all of the illustrated means are required to be implemented or provided. More or fewer devices may be implemented or provided instead.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a non-transitory computer readable medium, the computer program comprising program code for performing the method shown in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via a communication device, or installed from a storage device, or installed from ROM. All or part of the steps of the storage device management method of the embodiments of the present disclosure are performed when the computer program is executed by a processor.
The detailed description of the present embodiment may refer to the corresponding description in the foregoing embodiments, and will not be repeated herein.
A computer-readable storage medium according to an embodiment of the present disclosure has stored thereon non-transitory computer-readable instructions. When executed by a processor, perform all or part of the steps of the storage device management methods of the various embodiments of the disclosure described previously.
The computer-readable storage medium described above includes, but is not limited to: optical storage media (e.g., CD-ROM and DVD), magneto-optical storage media (e.g., MO), magnetic storage media (e.g., magnetic tape or removable hard disk), media with built-in rewritable non-volatile memory (e.g., memory card), and media with built-in ROM (e.g., ROM cartridge).

Claims (10)

1. A storage device management method, comprising:
acquiring first personnel information and first storage device information;
receiving a target storage device claim request instruction, and acquiring first request data;
judging whether a target storage device is available or not based on the first storage device information and the first request data;
if yes, a first trial result is obtained according to the first request data;
If not, judging that the first trial result is not passed;
acquiring a first identifier of an entrance person of a target place where the target storage equipment is located, and acquiring second person information;
determining whether the entrance person has a first right to the target place based on the first personnel information, the second personnel information and the first trial result;
if yes, identifying a first identifier of the entering person to obtain third person information;
based on the first personnel information, the third personnel information, and the first trial result, it is determined whether the entry personnel has a second right to the target storage device.
2. The storage device management method of claim 1, wherein,
the first personnel information comprises any one or more of an IC card number, a name, a position, a telephone, face data and fingerprint data;
the first storage device information comprises any one or more of electronic tag id, type, model, first personnel information of responsible person, asset code, storage address, service life threshold, periodic operation and maintenance time, use times threshold, operation and maintenance times threshold and state.
3. The storage device management method of claim 2, wherein,
the first request data comprises second storage device information, first applicant information and pickup reason information; wherein the second storage device information includes at least one or more of an electronic tag id, type, model number, and asset code of the target storage device; the first applicant information comprises at least one or more of an IC card number, a name, a position and a telephone of a person claiming target storage equipment;
the status includes not on shelf, not on shelf to be picked, not applied for picking and auditing pass, not picked and returned, not applied for returning and returned, returned and not cleaned, returned and cleaned, off shelf and scrapped;
the determining whether the target storage device is available based on the first storage device information and the first request data includes:
matching the second storage device information with the first storage device information;
if the matching is successful, judging whether the target storage device belongs to an unavailable condition or not based on the first storage device information;
wherein the unavailable condition comprises: the service life of the target storage device reaches a service life threshold, the target storage device is in regular operation and maintenance time, the service frequency of the target storage device reaches a service frequency threshold, the operation and maintenance frequency of the target storage device reaches an operation and maintenance frequency threshold, and the state of the target storage device is not on shelf, is applied for getting and checking to pass, is taken for not returning, is applied for returning but not returning, is returned but not cleaned, is taken off shelf or is scrapped.
4. The storage device management method according to claim 1, further comprising: the target storage equipment is stored in a cabinet lattice of the intelligent cabinet;
after determining that the entry person has a second right to the target storage device,
and opening a cabinet door of the cabinet where the target storage device is based on the first request data and the first storage device information.
5. The storage device management method according to claim 1, further comprising:
identifying a first identifier of a person who goes out of the target place to obtain fourth personnel information, and identifying a second identifier of the target storage device to obtain third storage device information;
determining whether the panelist has third rights to the target location based on the first personnel information, the fourth personnel information, the first request data, the third storage device information, and the first review result;
the fourth personnel information comprises any one or more of an IC card number, a name, a position, a telephone, face data and fingerprint data; the third storage device information includes at least one or more of an electronic tag id, a type, a model number, and an asset code.
6. A storage device management system, comprising:
the first acquisition module is used for acquiring first personnel information and first storage equipment information;
the first acquisition module is used for receiving a target storage device claim request instruction and acquiring first request data;
a first judging module, configured to judge whether a target storage device is available based on the first storage device information and the first request data; if yes, executing a first obtaining module; if not, executing a first judging module;
the first obtaining module is used for obtaining a first trial result according to the first request data;
the result judging module is used for judging that the first trial result is not passed;
the second acquisition module is used for acquiring a first identifier of an entrance person of a target place where the target storage device is located to obtain second person information;
the second judging module is used for determining whether the entrance personnel has a first authority to the target place or not based on the first personnel information, the second personnel information and the first trial result; if yes, executing a first identification module;
the first identification module is used for identifying the first identification of the entrance personnel and obtaining third personnel information;
And the third judging module is used for determining whether the entering person has a second right to the target storage device or not based on the first personnel information, the third personnel information and the first trial result.
7. A storage device management method, comprising:
acquiring first personnel information and first storage device information;
receiving a return request instruction of the target storage device, and acquiring second request data;
obtaining a second trial result according to the second request data;
acquiring a first identifier of an entrance person of a target place where a target storage device is located, obtaining fifth personnel information, and acquiring a second identifier of the target storage device, obtaining fifth storage device information;
determining whether the entrance person has a fourth right to the target place based on the first person information, the fifth person information, the second request data, the fifth storage device information, and the second trial result;
if yes, identifying a first identifier of the entering person to obtain sixth person information, and identifying a second identifier of the target storage device to obtain sixth storage device information;
determining whether the entry person has a fifth right to the target storage device based on the first person information, the sixth person information, the second request data, the sixth storage device information, and the second trial result.
8. A storage device management system, comprising:
the second acquisition module is used for acquiring the first personnel information and the first storage equipment information;
the third acquisition module is used for receiving a return request instruction of the target storage device and acquiring second request data;
the second obtaining module is used for obtaining a second trial result according to the second request data;
the fourth acquisition module is used for acquiring a first identifier of an entrance person of a target place where the target storage device is located, obtaining fifth personnel information, and acquiring a second identifier of the target storage device, obtaining fifth storage device information;
a fourth judging module, configured to determine, based on the first personnel information, the fifth personnel information, the second request data, the fifth storage device information, and the second trial result, whether the entrance personnel has a fourth right for the target location; if yes, executing a second identification module;
the second identification module is used for identifying the first identification of the entering person to obtain sixth person information, and identifying the second identification of the target storage device to obtain sixth storage device information;
and a fifth judging module, configured to determine, based on the first personnel information, the sixth personnel information, the second request data, the sixth storage device information, and the second trial result, whether the entrance personnel has a fifth right for the target storage device.
9. An electronic device, the electronic device comprising:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the storage device management method of any one of claims 1-5 and 7.
10. A computer-readable storage medium storing computer instructions for causing a computer to execute the storage device management method of any one of claims 1 to 5 and 7.
CN202311443952.6A 2023-11-01 2023-11-01 Storage device management method and system, electronic device and storage medium Pending CN117592683A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311443952.6A CN117592683A (en) 2023-11-01 2023-11-01 Storage device management method and system, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311443952.6A CN117592683A (en) 2023-11-01 2023-11-01 Storage device management method and system, electronic device and storage medium

Publications (1)

Publication Number Publication Date
CN117592683A true CN117592683A (en) 2024-02-23

Family

ID=89909048

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311443952.6A Pending CN117592683A (en) 2023-11-01 2023-11-01 Storage device management method and system, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN117592683A (en)

Similar Documents

Publication Publication Date Title
CN104240342B (en) Access control method and device based on identity authentication
US11276131B2 (en) Property management system utilizing a blockchain network
CN103473844B (en) Public affairs are rented a house intelligent control method and system
JP5592726B2 (en) Entrance / exit management system and method
CN103117993B (en) For the method, apparatus and product of the fire wall for providing Process Control System
CN104240013A (en) Door access control method and door access control platform
CN106097493B (en) A kind of rental house access control management method
CN108171527B (en) Customer information management system and method
CN112737825B (en) Log-based network device association method, system, device and storage medium
CN110111501B (en) Mobile house management platform
CN104240014B (en) A kind of online access control method and platform
KR102250586B1 (en) Electronic voting service platform technology and implementation method for apartment residents based on block-chain technology
CN110599653B (en) Access control unlocking method, device and storage medium
CN109902747B (en) Identity recognition method, device, equipment and computer readable storage medium
JP6151519B2 (en) Security card management service system and security card management service method
US20210211420A1 (en) Hybrid data managed lock system
CN110110874A (en) A kind of meeting room sharing method
CN113490936A (en) Face authentication device and face authentication method
CN106603562A (en) RIM cloud data identity verification system and method
CN116012991A (en) Method, device and related equipment for site access management
CN110634217B (en) House lease management method and server
CN117592683A (en) Storage device management method and system, electronic device and storage medium
CN111310151A (en) Distributed permission set-based permission management method, device and storage medium
CN110535962A (en) Method of data synchronization, device, equipment and storage medium based on authenticating device
CN117575201A (en) Device management method and system, electronic device and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination